1 / 12

Trust on the Network

Trust on the Network. What is Trust. Trust is approached differently by different disciplines Economics Rational trust exhibited through behavior Social Capital Internal trust which cannot be directly observed Philosophy Core human need Computer Science Rational extension of trust

cid
Télécharger la présentation

Trust on the Network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Trust on the Network

  2. What is Trust Trust is approached differently by different disciplines Economics Rational trust exhibited through behavior Social Capital Internal trust which cannot be directly observed Philosophy Core human need Computer Science Rational extension of trust Trustworthy versus trusted systems

  3. Rational Trust • Trustworthy systems (NAS) • Reliance (Golberg, Hill & Shostack, 2001) • Risk (Camp, 2001) • Transitive (Beth et al 2002)

  4. Trust as Privacy, Security Reliability • Security -- measurable, determinant but not static • Reliability -- measurable, failures detectable • Privacy • Exposure of identifiable information, addressed by anonymity • OR • Exposure of information identified by the data subject as creating risks

  5. Trust in the Network is Both • Privacy • Rational fear of risk e.g., medical privacy • Perception of risk, e.g., self-censorship • Network level: Routing • Rational • Shared trust • Dynamic updates • Motivation to cooperate

  6. Trust Must be Created and Communicated • Users bad security managers • PGP, P3P,…. • Security should necessarily be a default • Does end-to-end security maximize autonomy without end-to-end human abilities and tendencies? • Do users need to be managed or informed?

  7. Irrational Human Trust • Humans may not differentiate between machines • Humans become more trusting of ‘the network’ • Humans begin with too much trust for computers • Confirmed by philosophical macro observation • Confirmed by computer security incidents • E-mail based • Scams • Viruses • Hoaxes • Is the Nigerian Scam a case of flawed security?

  8. Computer security is built for machines • Passwords • Humans are a bad source of entropy • SSL • Two categories: secure and not secure • Does not encourage differentiation • Every site should include a unique graphic with the lock • Computer security should seek to differentiate machines

  9. Privacy standards are built for machines • P3P assumes • All merchants trustworthy w.r.t. their own policies • Assumes increasingly sophisticated user • One standard for all transactions • PGP • Monotonic increase in trust • No reset • No decrease in rate of trust extension • To compensate for increasing trust • No global or local reset • E.g. change in status

  10. Agents and Standards set Trust Levels • Assumes a simple cut-off • People may accept more risk for lower price • Variable trade-offs for different products • Markets have different variables • Medical vs auto markets • Products have intrinsic differences • Open code: games vs government • Trust is too variable in different environments • An example of an inadequate standard

  11. Trust Seals • Not self-verifying • Do users distinguish between trust seals: • PrivacyBird (P3P) • Practices not verified, set of simple policies • Better Business Bureau • Mortar business in good standing with BBB • Truste • Company applies its own privacy policy • No limits on data use • Truste EU • Company complies with EU Data Protection Policies

  12. WHAT TO CONCLUDE? Computer security must be designed with humans in mind - OR - Assuming the human will act like the computer is the core design problem, remove assumptions about humans Is This Possible?

More Related